• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Eight Excel Vulnerabilities Makes Spreadsheets Risky

June 14, 2011 By Corey Nachreiner

Severity: High

14 June, 2011

Summary:

  • These vulnerabilities affect: Most current versions of Excel, which ships with Microsoft Office
  • How an attacker exploits it: By enticing one of your users to open a malicious Excel document
  • Impact: In the worst case, an attacker executes code on your user’s computer, gaining complete control of it
  • What to do: Install Microsoft Office updates as soon as possible, or let Microsoft’s automatic update do it for you

Exposure:

As part of today’s Patch Day, Microsoft released a security bulletin describing eight vulnerabilities found in Excel — part of Microsoft Office for Windows and Mac. The flaws also affect some of the Office document viewer and converter applications

Though the eight vulnerabilities differ technically, they share the same scope and impact. If an attacker can entice one of your users into downloading and opening a maliciously crafted Excel document, he can exploit any of these vulnerabilities to execute code on a victim’s computer, usually inheriting that user’s level of privileges and permissions. If your user has local administrative privileges, the attacker gains full control of the user’s machine.

Solution Path

Microsoft has released patches for Office to correct all of these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately, or let the Microsoft Automatic Update feature do it for you.

Excel update for:

  • Office XP w/SP3
  • Office 2003 w/SP3
  • Office 2007 w/SP2
  • Office 2010 32-bit
  • Office 2010 64-bit
  • Office 2004  for Mac
  • Office 2008  for Mac
  • Office for Mac 2011
  • Open XML File Format Converter for Mac
  • Excel Viewer
  • Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats

For All WatchGuard Users:

While you can configure certain WatchGuard Firebox models to block Microsoft Excel documents, some organizations need to allow them in order to conduct business. Therefore, these patches are your best recourse.

If you want to block Excel documents, follow the links below for video instructions on using your Firebox proxy’s content blocking features by file extensions (.xls and .xlsx). Keep in mind, blocking files by extension blocks both malicious and legitimate documents.

  • Firebox X Edge running 10.x
    • How do I block files with the FTP proxy?
    • How do I block files with the HTTP proxy?
    • How do I block files with the POP3 proxy?
    • How do I block files with the SMTP proxy
  • Firebox X Core and X Peak running Fireware 10.x
    • How do I block files with the FTP proxy?
    • How do I block files with the HTTP proxy?
    • How do I block files with the POP3 proxy?
    • How do I block files with the SMTP proxy?

Status:

Microsoft has released Office updates to fix these vulnerabilities.

References:

  • MS Security Bulletin MS11-045

This alert was researched and written by Corey Nachreiner, CISSP.

Share This:

Related

Filed Under: Security Bytes

Comments

  1. Alexander Skordos says

    June 14, 2011 at 11:22 pm

    Well, my thought was, if the general policy of the system is strict meaning only necessary ports are opened outgoing and none incoming, but alllows excel files, IPS and A/V is enabled and scans, you can still get it?
    Would Win7 UAC help in this case?

    Reply
    • Corey Nachreiner says

      June 15, 2011 at 10:21 am

      Since most ppl allow http and email, uses often can download excel files, so can certainly succumb to this issue. That said, if you have our XTM appliance’s GAV enable, it can, and does, catch malicious Office documents… However, AV is never perfect, whether or not it would catch the malicious document really depends on the variant of malware/exploit embedding… That’s why I still think patching is the best recourse…. or you can use our HTTP and SMTP proxies to block all Excel docs, but that is too restrictive for some networks…

      As far as Windows UAC…. yes, this can help mitigate malware to some extent. However, there are many bad things malware can do without superuser/administrator privilege. If the malware tries to open listening ports, or send raw TCP/IP packets, then the lack of administrative access can restrict it.. However, the malware can still have access to all your files….

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Successfully Prosecuting a Russian Hacker
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • Cybersecurity’s Toll on Mental Health
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use